









Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Some concept of Cryptography are Block Ciphers, Classical Cryptography, Computational, Cryptanalysis, Digital Signatures, Knowledge Proofs, Number Theory, One Way Functions, Perfect Secrecy, Perfect Secrecy. Main points of this lecture are: Hash Functions, Message Authentication, Codes, Alice, Insecure Channel Modifiable, Encodes Message, Appends, Randomly, Hash Function, Inputs
Typology: Slides
1 / 15
This page cannot be seen from the preview
Don't miss anything!
2
AUTHENTICATION PROBLEM: Alice ( A ) sends Bob ( B ) a message through insecure channel modifiable by Mallory ( M ) GOAL: A encodes message in a way that enables B to detect any modification A^ B
M I^
U
I! U
4
Hash function h should satisfy:
Finding different inputs with same output is computationally intractable
Easy to compute, hard to find pre-images
5
7
DEF: An element g in a group G is said to be primitive (or a generator ) if every element in G can be expressed in the form for some exponent index i. If G contains a primitive element, G is said to by cyclic.
NOTE: Equivalently, g is primitive if the first positive index for which is i = n = | G |.
THM: If F is a finite field, then is cyclic.
COR: If p is prime, is cyclic. Also, suppose g is primitive in. Then is primitive iff i is relatively prime to.
Z^ ∗ p
8
Can figure out everything about how numbers multiply in by seeing how their exponents (indices) add in. Generalization:
THM: If p is a prime number, then there is an isomorphism:.
NOTE: Isomormophism only easy to compute in (index)→(number) direction. Other direction (number)→(index) is DLog problem.
Z^ ∗ p Z^ + !( p )
10
THM: Existance of a BPP algorithm for collision finding in discrete log hash family, implies a BPP algorithm for discrete log prob. Note: Computational complexity definitions require considering infinite family of log hashes where allow arbitrarily large domains. LEMMA: Collision resistance implies one- wayness when domain >> codomain. COR: Discrete log hash “is” one way.
11
INPUT: p - prime, x,y with x primitive
OUTPUT:
EXTERNAL: FindCollision - assumed procedure for finding collisions in
if not prime, or y not primitive “FAIL”
( a, b ) = FindCollision( K )
... continued next page ...
p − 1 2 q = p − 1 2 ,! = x , " = y , K = ( p , q , !, ")
13
particular hash function, shrinking arbitrarily long messages to fixed length tags. EXAMPLE (Simple Merkle-Damgård):
that is never an output. Discrete log hash (viewed on bitstring) satisfies these.
from bitstrings of length < 132 to bitstrings of length exactly 132.
14
INPUT: bitstring OUTPUT: bitstring EXTERNAL: compression function h //Break up into 128-bit blocks: for // buffer
for each block // concatenate strings // view z as a number return n
i ∈ [ 1 ,
⌊ (^) k 128
⌋ ]